Show TOC

SecurityLocate this document in the navigation structure

This section provides an overview of the security-relevant information that applies to SAP Jam Integration.

Caution

This section primarily provides security information specific to SAP Jam Integration rather than security information for SAP Jam itself, or the SAP Business Suite components. This means that additional and important security information specific to these components might exist without being explicitly mentioned here. You can find more security information on these components in their corresponding security and/or administrator’s guides.

Why Is Security Necessary?

With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These demands on security apply likewise to SAP Jam Integration.

Fundamental Security Guides
SAP Jam Integration is a solution that integrates functionality from a number of SAP applications. Security information related to these applications can be found in documents created specifically for them:
Table 1:

Scenario, Application or Component Security Guide

Location

SAP Library for User Interface Add-On for SAP NetWeaver

http://help.sap.com/nw-uiaddon
SAP NetWeaver Security Guide http://help.sap.com/nw_platform

SAP Jam Administrator Guide

http://help.sap.com/sapjam
SAP Gateway Security Guide http://help.sap.com/nwgateway

SAP UI Development Toolkit for HTML5 (SAPUI5)

https://sapui5.hana.ondemand.com/
SAP Fiori apps http://help.sap.com/fiori